Remove Examples Remove Exercises Remove File names Remove Mining
article thumbnail

The 773 Million Record "Collection #1" Data Breach

Troy Hunt

I've written before about what's involved in verifying data breaches and it's often a non-trivial exercise. For example, logging on to a mobile app is dead easy: Password managers are one of the few security constructs that actually make your life easier. How can I check if people in my organisation are using passwords in this breach?

article thumbnail

Gab Has Been Breached

Troy Hunt

differs: For example, because they couldn't find any public discussion about the breach they assumed that @WIRED reporters were "essentially assisting the hacker in his efforts to smear our business" There are *always* discussions held in private about a breach before it's made public. Gab's approach. Coincidence?

Passwords 145